Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Jenkins
  4. DotCi
  5. 2.23.0

Known Vulnerabilities in DotCi 2.23.0

Show more ↓
2.40.00
2.39.10
2.39.9
2.39.8
2.39.7
2.39.6
2.39.5
2.39.4
2.39.3
2.39.2
2.39.1
2.39.0
2.38.11
2.38.10
2.38.9
2.38.8
2.38.7
2.38.6
2.38.5
2.38.4
2.38.3
2.38.2
2.38.1
2.38.0
2.37.0
2.36.2
2.36.1
2.36.0
2.35.0
2.34.0
2.33.0
2.32.1
2.32.0
2.31.0
2.30.7
2.30.4
2.30.3
2.30.2
2.30.1
2.30.0
2.28.1
2.28.0
2.27.3
2.27.1
2.27.0
2.26.0
2.25.1
2.25.0
2.24.3
2.24.2
2.24.1
2.24.0
2.23.0
2.22.26.0
2.22.1
2.22.0
2.21.0
2.20.1
2.20.0
2.19.5
2.19.3
2.19.1
2.19.0
2.18.0
2.17.0
2.16.1
2.16.0
2.15.1
2.15.0
2.14.5
2.14.4
2.14.3
2.14.2
2.14.1
2.14.0
2.13.1
2.13.0
2.12.3
2.12.2
2.12.1
2.12.0
2.11.2
2.11.1
2.11.0
2.10.0
2.9.2
2.9.1
2.9.0
2.8.9
2.8.8
2.8.7
2.8.6
2.8.5
2.8.4
2.8.3
2.8.2
2.8.1
2.8.0
2.7.8
2.7.7
2.7.6
2.7.5
2.7.4
2.7.3
2.7.2
2.7.1
2.7.0
2.6.9
2.6.8
2.6.7
2.6.6
2.6.5
2.6.4
2.6.3
2.6.2
2.6.1
2.6.0
2.5
2.3
2.2
2.1.0
2.0.0
1.3.4
1.3.3
1.3.2
1.3.1
1.3.0
1.2.2
1.2.1
1.2.0
1.1.1
1.1.0
1.0.3
1.0.2
1.0.1
1.0.0



Multiple vulnerabilities in Jenkins DotCi plugin23 Sep, 2022
Medium Not Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Russian GRU hackers accused of massive espionage campaign across NATO and allied nations
  • Chinese-speaking threat actors exploit Cityworks zero-day to hack into US govt agencies
  • Infamous Lumma stealer malware disrupted in global takedown
  • Hazy Hawk hijacks abandoned cloud resources of global orgs to spread scams and malware
  • 100+ websites lured victims into downloading malicious Chrome extensions
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.